Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
097be37aef9ea5b563b3f7469847ecba_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
097be37aef9ea5b563b3f7469847ecba_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
097be37aef9ea5b563b3f7469847ecba_JaffaCakes118.html
-
Size
22KB
-
MD5
097be37aef9ea5b563b3f7469847ecba
-
SHA1
ad23975a6509cd1a892fd0c3f8af939f148a1f7f
-
SHA256
afa6f896e1161bc5a09e53a92a2be9818c78dc7b7a1d621bf90c189a6c8e50d3
-
SHA512
cae659d3c0f036592f95ab2230d8400fddbe2df604e031274fef936277e1673e740e6032dfe135b725466489bdfc1a04a18acd3781563d2944cf36c3b2c903af
-
SSDEEP
384:SaypYXWBuB80/eUUAWLg9rZu0XOq5gbixFtBQ3dmtHLUCn58b:SjiWIO02I91PXOq5gCBcCn5O
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420629614" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D77DF61-06D0-11EF-9680-DA96D1126947} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000005d926135713acb823d021fb65e616458586cfb25bc72062eed9414a2db435d8c000000000e8000000002000020000000ea6ce191d66454f8117a9fe35660f787c2e49174e558b3f27f0f34cdd015722320000000b28ab07f95eb55f992c8e245598d54a460ece178383fdd49c17458d231f6e8ca40000000ed1cf2de00541591d101672a6b9e4e99b72d74bdda69ddf51c41b9bf7f75461f2d7cf2444ec2aaa478ec259dc652556bca583fe512d58e1f2a0c658d68b19936 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60963a48dd9ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2556 2252 iexplore.exe 28 PID 2252 wrote to memory of 2556 2252 iexplore.exe 28 PID 2252 wrote to memory of 2556 2252 iexplore.exe 28 PID 2252 wrote to memory of 2556 2252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\097be37aef9ea5b563b3f7469847ecba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d726051c1bd1e96cbe46a2ae4e08b7b
SHA1226052b5585fa0b04c37653d1e12460d43a1416a
SHA25642a21a08392090255c0e005ab60167075d2f982527724288dbbfd50f175be358
SHA51292ea48930efadcc4e2e95ce081216a056d7d2779ea7c0e01c2bfebc72046cfe9b9a859c2f0f0abe91350fd5caab161966fa618fe352a691a9a78eba2a0dc91ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521b8f9014cf8995321ec4f57bda05c0e
SHA16f9ec901229283ac568e319ffc08d2d2516fdc60
SHA25649fa1011da907b7ec1286e113805486951bd8f5b6d3c261ffae6c154ad7cef7c
SHA512f4cd1aefb4158517dae53557edbcbc69d0bcf7a7b8d30c7949232d431a203353e59f84ba3f45571bb241f2e15d9ef27de1243de8a99279bf399d6dc0e5ddc687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cda23c91032c3a606b15f904aaba82b
SHA1e4fee89268e41fd4c55574a66b6b93b1cc5e5e66
SHA25639235cc99c73c86153b65f1e5763032610a4b8df7cdf04e42a5856fd6d06bf98
SHA51221da770cda7e219a91a425845121c4c38a79c1811e452add2ca0c50245f119937f006674489d02db5347fdf41cf5335b627c04f86c7c2c45110c5e860383d796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d944aec289c1b9c97c20cdae0571276
SHA16c1be49055b7c645acf8de5523108815f0f5a623
SHA2569de46ab0201c903796521402f3560c844267e2061c7841a6f6ee0bf62f30e70b
SHA5120217765e40142f8db3b6272b7aba2336f7206ce49b6e2692871863f7a03f5f4657581a6cd59f4f3599f9c3f9205bdeb6f9d84abd9b4a28793cbe8ec7f39165f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7990205832a3fadc3c85a3ee7ea6925
SHA117ada87eaa7c1cf7f5a6e897a77d8ad2f76321c1
SHA256aca3f00f77a1a7db872279ff85a33311a420553861b4b264e714c1af881fe8f8
SHA51281864685c9efd56a53740fb6158db954c97fc0a6f3a0219aeeebcf5744d92757dc08648f48c58df286b72bc038428321d6962eb351a15ccfcce826167196cf7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a650e7c959f9d20619b092c603c90829
SHA1a439ecdcbada42d38f6dfc874f634eb063a847f8
SHA256b23a1365183ad49e987ed3f80a76e6bda6f6ec6da8faac8d4d0202693f961498
SHA5121d9deeaf4f5e06e0b0702cf743c90a987d6e2e2d601831e93ce2a373d41554c22219b54d84e7503810b91e5e9f9f4f522601a9b50b329aa595ad67ace1d6f6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523762a803008b22654759051f557bc93
SHA1c5ee832111eacd577abdd0baad292aa3faa43a38
SHA2566d3e99bf1f41e12177f80bda558d630032215bf35f804b6b16603a15515e62a8
SHA512a7a7fadc8796895660482bf47470b0bfe8c77eea8abaa0f2d48e03f788186b9fe0cb97aaed04d70b038d72f6d7b7e8579873307d4aa7726d498d954caa8ca931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c58f2f2cb27fc6922eef54cc197707a
SHA15538bbaed73186f75027e88793a83fae51e52686
SHA2561ecf7be11c04157c996c534c2f646c612c117a49c280b3924f5b68005b81fcd7
SHA512f29d3f6e2ff34b178b30a701d0638b0b2a51c3ac5bc544adc85ada79ec4bdf88ef542b3d59d2094934596acdc0836355a3173243dfe194382406f3a56f9ddc91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535640df6ea84345acd55f7ebbe8b7d53
SHA13a02c1b720641343fd6692b56fab8f1c396c80f5
SHA256e2693d8e9e6c8be058782208935a0332d5a3cf274b244bdd765eaef85e396cb8
SHA512c492646632242a00a3e79ad822976cae6b998ddc19e48cdb0627e14cc65c0582c739af50c25f12a599455ae476d9d69bab4107d2f9166f343037e8f06828793b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549d789fee526451494eb555c0e54d78d
SHA1bf5b1c63f0920483b391e544fe43ac358c2a1ab9
SHA2564bc604f00f12f2b1bc965fd2b5cd341795b3c768544e788b58c0d0ed69f10457
SHA51291d6394538c44e32ae0d9351cea9d47aa5b33c1810bbee4d999892e7c609a917f13c82a99ea18227399328dc0b818b38cc3b8ddc3bb1a4a1c1886f3ad874876d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598b8c6501b2f3120ad5958836f9030ae
SHA14cea7dca2531ad32d43e1c6027a3bf7f74da2c7d
SHA2561aa926b8e50f7d5d40e29971cef42ef1763fb76f3122306176cd4d39b3552ccc
SHA512468bdc3dc35cc5219b1443ba578791ede44de8ca5a42809b88dcd4838785fcc56454398370cf8acac7d4003c2613c79b7b5223eab6ccc64c65110e4711e6627d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f6d1faac174c902de536457c0c68746
SHA1c232bd261da91e67a964765029bd50ddb948d231
SHA256fe34582cda5cba3e696ee0766f0cc6fe4cf409f81441a87a5a781afa7594a683
SHA512177d7c442078b828d43b05a66cf59ec738a80e89c979aac29711e91d94fc065b6baab42d3fd001e38db8ef93ecb2932e3036a1936452a8e0438f4a8f0f4699fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a9124490644899ad49d3ba147fec9a3
SHA1ae5c2a59f5c837e3e0cef2fdf9f468477e553c0c
SHA256d93659c8c0da573dcda9550c72c94d8a35fb373cdf7127a91d2eba0d6fcb3a1e
SHA5121bcdf10adeb6419cd90ea9fb8356837ea88633edb6031bcff7a5711a66e45c6b528ddb57ae6891659ec9fca94b97504ba515422ad03f729d2a42e57d6fe01a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519b54a67d322d053a9d1e569ab9921ec
SHA1d64c432e6993e11ed81af201b95ec56958180f1e
SHA25698a3757d0744d7dd8882008424a2ab89812749ecb1875d68e045f595af07d6e9
SHA5129ceeaf84562c10b69c6a0d0c96d1adf2f7ee3178b29cb700627e6f08855cb682c300876a19af9f257a9af5562f67c4883b841c8f167a3fbe658289a8fb2458cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5233147ba74348a0f5f90c369920812df
SHA120f27b065495c36ccb8cab499a50cdd86e311a15
SHA25689716f1ce2633f7d6a5902f85cd829c73d4324a7e3a301857f90fdf20cb24126
SHA512dcb8084509f9c600282911311bebbc29f58897f3b6f9741d94e6f444c4941c47bfea7de9c51b7da7bf4fa990a152ed850af8f5f3a554d71e53cc6974a1b69258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570cad70ecf1dfd0d24d755b8967dcaef
SHA1d573b63a64b1dbc5efecf76e4df22357a0080328
SHA256e9c11b8a744a41f1c3e21ccf885fa0c93cac9f7854ee101cd17f19bb49641d2c
SHA512d9ce3926a202b6c52196b4764aebaef58107b8ccabca46d836cefe35eff346599eeefdfe08ba3b62462994cdfc53091a182f5fa8ad2d1369e3711b9e8865ab7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5484846235255a958a69736d3641d72a8
SHA1f34150d8c8012e3e5b0f1132e01f4e8d658efd48
SHA256039445369d26d37f6beb8e060aa20e308640ea18bb478b342cf9c2cf5ab0f305
SHA512764d164960cf4c6e32a034f5679407a9953bbe104540b8f852d7c352afaef562df9e228e86f0c360b30faf78cc1350379b4b57176c55dd8fb0bdc2372ea035a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aefd9592f8f6348c5db8937eacf9bace
SHA143965295259a78a34cbd3ea626c0767c4ad5edd2
SHA25661dd495c42c41fdae6087988ee67b9f1a3f2465f92aa3aea502ce79a8a79aa05
SHA512e18e8e848617799673c646c7d90d113e88d28be769f08c173202468a035f11455efa97648b5ab9a027d397084bbe5a4c2c7838f7d95ca43ecca8037a26184cee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a